The ingenuity of malware substitution: Bypassing next-generation Antivirus.
Osama EllahiMunam Ali ShahMuhammad Usman RanaPublished in: ICAC (2021)
Keyphrases
- anti virus
- malware detection
- computer security
- malicious executables
- operating system
- dynamic analysis
- computer viruses
- anomaly detection
- network security
- malicious behavior
- detecting malicious
- computer systems
- reverse engineering
- static analysis
- intrusion detection
- network intrusion detection
- information systems
- information security
- knowledge discovery